Development Notice: Backend integration in progress. Currently using demo threat intelligence data for demonstration purposes.
Automated CVE intelligence pipeline that ingests NVD vulnerability data, performs threat analysis, and generates executive-ready PDF reports with actionable insights
A comprehensive Python-based CVE intelligence platform that automates the complete lifecycle from vulnerability discovery to executive reporting
ThreatStream is a production-ready Python application that fetches Common Vulnerabilities and Exposures (CVE) data from NIST's National Vulnerability Database, processes and enriches it, then generates professional PDF reports and Power BI-ready analytics. The backend requires Python 3.12+ and cannot run on static hosting like GitHub Pages — it must be run locally or on a server with Python runtime.
Fetches the latest vulnerability data from NVD API with incremental updates, pagination handling, rate limiting, and state management to prevent duplicate processing.
Generates professional PDF reports with charts, trend analysis, critical vulnerability hotlists, and strategic security recommendations ready for executive distribution.
Exports pre-structured CSV files optimized for Power BI dashboards, enabling instant visualization of CVE trends, vendor risks, and CVSS severity distributions.
Enriches CVE data with CVSS scoring, attack vector analysis, vendor risk assessment, CWE (Common Weakness Enumeration) categorization, and exploit reference tracking.
Get ThreatStream running in minutes on your local machine or server
ThreatStream requires Python 3.12+ and cannot run on GitHub Pages or static hosting platforms. It needs a Python runtime environment to fetch data from NVD API, process parquet files, generate charts, and create PDF reports. The application can be run locally on Windows, macOS, or Linux, or deployed to a cloud server.
Download ThreatStream from GitHub
Set up isolated Python environment
Install required Python packages
Add your NVD API key for better rate limits
Execute the complete CVE processing workflow
Create reports for specific time periods with interactive menu
For detailed documentation, API reference, and advanced configuration options:
View on GitHub Read Full READMESee exactly what happens when you run ThreatStream
The pipeline automatically fetches, processes, and reports on CVE data in under 60 seconds!
Six automated stages transform raw NVD data into actionable intelligence
Incremental fetch from NVD API with state management
Convert JSON to structured parquet datasets
Add vendor mappings and CWE categories
Generate analytics and trend metrics
Create professional PDF documents
Power BI-ready CSV exports
Enterprise-grade features designed for security operations teams
Smart state management tracks processed CVEs, fetching only new vulnerabilities since last run. Prevents duplicate processing and optimizes API usage.
Intelligent mapping of vendor aliases to canonical names (e.g., "Microsoft" vs "MS" vs "MSFT") ensures accurate risk assessment across product lines.
Automatic severity classification using CVSS v3 base scores. Identifies critical vulnerabilities (≥9.0) requiring immediate patching priority.
Daily, weekly, monthly, and yearly reporting with time-series analysis. Tracks vulnerability disclosure patterns and emerging threat vectors.
Maps vulnerabilities to Common Weakness Enumeration categories, enabling root cause analysis and targeted security improvements in development practices.
Classifies vulnerabilities by attack vector (Network, Local, Physical, Adjacent) to prioritize infrastructure hardening efforts and exposure reduction.
Executive-ready PDF reports with comprehensive threat intelligence
ThreatStream exports optimized CSV files that can be directly imported into Power BI for interactive dashboards:
daily_overview_*.csv - Daily CVE counts and trendsvendor_weekly_*.csv - Vendor risk analysis by weekhotlist_*.csv - Critical vulnerabilities for immediate actioncwe_trends_*.csv - Vulnerability type distribution over timeGet ThreatStream running in minutes on your local machine or server
ThreatStream requires Python 3.12+ and cannot run on GitHub Pages or static hosting platforms. It needs a Python runtime environment to fetch data from NVD API, process parquet files, generate charts, and create PDF reports. The application can be run locally on Windows, macOS, or Linux, or deployed to a cloud server.
Download ThreatStream from GitHub
Set up isolated Python environment
Install required Python packages
Add your NVD API key for better rate limits
Execute the complete CVE processing workflow
Create reports for specific time periods with interactive menu
For detailed documentation, API reference, and advanced configuration options:
View on GitHub Read Full READMEKey statistics and capabilities of the ThreatStream platform
Clone ThreatStream, run the pipeline, and start generating professional CVE intelligence reports for your organization. Full source code and documentation available on GitHub.